Behavioral task
behavioral1
Sample
82fb2d58d58120d6b9d129f8e3857e07.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
82fb2d58d58120d6b9d129f8e3857e07.exe
Resource
win10v2004-20231215-en
General
-
Target
82fb2d58d58120d6b9d129f8e3857e07
-
Size
41KB
-
MD5
82fb2d58d58120d6b9d129f8e3857e07
-
SHA1
d867c686acb2ff04b4508aee39a14caba918838f
-
SHA256
854226fc4f5388d40cd9e7312797dd63739444d69a67e4126ef60817fa6972ad
-
SHA512
b5c9f9503e8efff13491b0d058aad2a2160dd6c0a6de3d7477ea8bcab872c2adde829a773bfcd6edb709258a3eb96ef2ac7e1866ce11a262d8ac1561cb97868a
-
SSDEEP
768:3diAfvvh1vFQb4xmQj7292LqOkgG/uD+1xGI5vSMEbyZTsy3zBiLYEDcADfZNhfI:3JfvDWimQj/qOkg1q5SME++UB5OhNJwn
Malware Config
Signatures
-
MAKOP ransomware payload 1 IoCs
resource yara_rule sample family_makop -
Makop family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 82fb2d58d58120d6b9d129f8e3857e07
Files
-
82fb2d58d58120d6b9d129f8e3857e07.exe windows:4 windows x86 arch:x86
055a7261a65e6e55b208e68e7b0060b7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mpr
WNetCloseEnum
WNetEnumResourceW
WNetOpenEnumW
kernel32
CreateFileW
GetLastError
FindClose
FindFirstFileW
DeviceIoControl
GetDriveTypeW
WaitForMultipleObjects
SetErrorMode
FindNextFileW
TryEnterCriticalSection
Sleep
GetStdHandle
WriteFile
ReadFile
FlushFileBuffers
GetFileSizeEx
MoveFileW
SetFileAttributesW
SetEndOfFile
SetFilePointerEx
GetCurrentProcess
HeapFree
GetProcessHeap
GlobalAlloc
GetFileAttributesW
GetVersion
HeapAlloc
SetEvent
TerminateThread
PeekNamedPipe
CreateEventW
GetComputerNameW
OpenProcess
GetProcAddress
GetFileType
GetModuleHandleA
DuplicateHandle
GetCurrentProcessId
ExitProcess
GetModuleHandleW
GetCommandLineW
CreatePipe
Process32FirstW
CreateProcessW
Process32NextW
GetSystemWindowsDirectoryW
GetLogicalDrives
SetHandleInformation
GetLocaleInfoW
GetModuleFileNameW
GetEnvironmentVariableW
CreateDirectoryW
CreateThread
WaitForSingleObject
GetVolumeInformationW
TerminateProcess
DeleteCriticalSection
GetExitCodeProcess
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
CloseHandle
GlobalFree
CreateToolhelp32Snapshot
user32
SetWindowTextW
SetTimer
RegisterHotKey
EndDialog
PostMessageW
ShowWindow
KillTimer
UnregisterHotKey
GetWindowTextLengthW
CloseClipboard
GetWindowTextA
EmptyClipboard
GetDlgItem
OpenClipboard
wsprintfW
wsprintfA
GetWindowThreadProcessId
GetShellWindow
DialogBoxParamW
SetWindowTextA
MessageBoxW
SendMessageW
SetClipboardData
EnableWindow
advapi32
CryptReleaseContext
CryptGenRandom
CryptImportKey
CryptEncrypt
CryptAcquireContextW
CryptSetKeyParam
GetTokenInformation
SetTokenInformation
OpenProcessToken
DuplicateTokenEx
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
CryptDestroyKey
CryptDecrypt
shell32
ord680
CommandLineToArgvW
ShellExecuteExW
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetSpecialFolderPathW
ole32
CoUninitialize
CoInitialize
CoTaskMemFree
netapi32
NetGetJoinInformation
NetApiBufferFree
Sections
.text Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ndata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 664B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ